关联漏洞
标题:
GLPI SQL注入漏洞
(CVE-2025-24799)
描述:GLPI是GLPI开源的一款开源IT和资产管理软件。该软件提供功能全面的IT资源管理接口,你可以用它来建立数据库全面管理IT的电脑,显示器,服务器,打印机,网络设备,电话,甚至硒鼓和墨盒等。 GLPI存在SQL注入漏洞,该漏洞源于库存端点SQL注入,可能导致未经授权的操作。
描述
CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection
介绍
# CVE-2025-24799 Auto Exploit



---
## ⚡ Overview
**CVE-2025-24799** is a proof-of-concept (PoC) exploit targeting **GLPI**.
This exploit demonstrates **unauthenticated SQL Injection (time-based blind)** to extract user credentials.
> **Disclaimer:** This PoC is for educational purposes only. Do **not** use on systems without permission.
---
## 🛠 Features
- Detects `glpi_users` table and required columns (`name` and `password`)
- Extracts usernames and passwords sequentially
- Time-based blind SQL injection for unauthenticated exploitation
- Colorful console output with status, success, failure, and info messages
- Works on Python 3.x with minimal dependencies
---
## ⚙️ Installation
1. Clone the repository:
```bash
git clone https://github.com/Rosemary1337/CVE-2025-24799.git
cd CVE-2025-24799
````
2. Install dependencies:
```bash
pip install -r requirements.txt
```
> Requirements: `requests`, `colorama`, `beautifulsoup4`
---
## 🚀 Usage
```bash
python3 main.py -u <TARGET_URL>
```
### Example:
```bash
python3 main.py -u http://target.com/index.php/ajax
```
### Arguments
| Flag | Description | Required | Default |
| ----------- | ----------- | -------- | ------- |
| `-u, --url` | Target URL | Yes | - |
---
## 🎨 Output
The console shows:
* Status messages `[•]`
* Success `[✔]`
* Fail `[✖]`
* Info `[i]`
Example:
```
[•] Exploiting CVE-2025-24799...
[✔] Table 'glpi_users' found.
[✔] Required columns verified.
[i] Starting credential extraction...
[+] Credential 1: admin:5f4dcc3b5aa765d61d8327deb882cf99
[+] Credential 2: user:123456
[*] Extraction complete.
```
---
## 🔐 Security & Disclaimer
* For **educational & testing purposes only**.
* Do **not** attack websites without explicit permission.
* Use in a controlled lab or authorized penetration test only.
---
## 🔗 Connect with Me
I'm an active developer who enjoys building tools and sharing knowledge. You can reach me through:
<p align="left"> <a href="https://github.com/Rosemary1337" target="_blank"> <img src="https://img.shields.io/badge/GitHub-181717?style=for-the-badge&logo=github&logoColor=white"/> </a> <a href="https://t.me/stupidp3rson" target="_blank"> <img src="https://img.shields.io/badge/Telegram-26A5E4?style=for-the-badge&logo=telegram&logoColor=white"/> </a> <a href="https://www.tiktok.com/@justan0therloser" target="_blank"> <img src="https://img.shields.io/badge/TikTok-000000?style=for-the-badge&logo=tiktok&logoColor=white"/> </a> <a href="mailto:rayhanmahardika576@gmail.com" target="_blank"> <img src="https://img.shields.io/badge/Email-8A2BE2?style=for-the-badge&logo=minutemailer&logoColor=white"/> </a> </p>
文件快照
[4.0K] /data/pocs/dfc3a11d88209edc2b59085a01f2baafa18887a0
├── [1.0K] LICENSE
├── [6.9K] main.bin
├── [ 255] main.py
├── [2.8K] README.md
└── [ 33] requirements.txt
0 directories, 5 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。